// For flags

CVE-2023-28204

Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.

A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.

Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-03-13 CVE Reserved
  • 2023-05-22 Exploited in Wild
  • 2023-05-30 CVE Published
  • 2023-06-12 KEV Due Date
  • 2024-08-02 CVE Updated
  • 2024-11-20 EPSS Updated
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-125: Out-of-bounds Read
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apple
Search vendor "Apple"
Safari
Search vendor "Apple" for product "Safari"
< 16.5
Search vendor "Apple" for product "Safari" and version " < 16.5"
-
Affected
Apple
Search vendor "Apple"
Ipados
Search vendor "Apple" for product "Ipados"
< 15.7.6
Search vendor "Apple" for product "Ipados" and version " < 15.7.6"
-
Affected
Apple
Search vendor "Apple"
Ipados
Search vendor "Apple" for product "Ipados"
>= 16.0 < 16.5
Search vendor "Apple" for product "Ipados" and version " >= 16.0 < 16.5"
-
Affected
Apple
Search vendor "Apple"
Iphone Os
Search vendor "Apple" for product "Iphone Os"
< 15.7.6
Search vendor "Apple" for product "Iphone Os" and version " < 15.7.6"
-
Affected
Apple
Search vendor "Apple"
Iphone Os
Search vendor "Apple" for product "Iphone Os"
>= 16.0 < 16.5
Search vendor "Apple" for product "Iphone Os" and version " >= 16.0 < 16.5"
-
Affected
Apple
Search vendor "Apple"
Macos
Search vendor "Apple" for product "Macos"
>= 13.0 < 13.4
Search vendor "Apple" for product "Macos" and version " >= 13.0 < 13.4"
-
Affected
Apple
Search vendor "Apple"
Tvos
Search vendor "Apple" for product "Tvos"
< 16.5
Search vendor "Apple" for product "Tvos" and version " < 16.5"
-
Affected
Apple
Search vendor "Apple"
Watchos
Search vendor "Apple" for product "Watchos"
< 9.5
Search vendor "Apple" for product "Watchos" and version " < 9.5"
-
Affected
Webkitgtk
Search vendor "Webkitgtk"
Webkitgtk\+
Search vendor "Webkitgtk" for product "Webkitgtk\+"
< 2.42.3
Search vendor "Webkitgtk" for product "Webkitgtk\+" and version " < 2.42.3"
-
Affected